The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.
☆19Jan 20, 2023Updated 3 years ago
Alternatives and similar repositories for internet-of-vulnerable-things
Users that are interested in internet-of-vulnerable-things are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆23Jun 22, 2024Updated last year
- A python library for search data on shodan, google, duckduckgo☆11Sep 30, 2022Updated 3 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- ☆25Aug 2, 2023Updated 2 years ago
- ☆24Feb 14, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Scape firmware metadata from 18 vendors and download corresponding firmware images. Save in MySQL database for InfoSec research purposes.☆12Feb 17, 2023Updated 3 years ago
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆37May 20, 2024Updated last year
- Free vpn, tor, datacenter, threat detection on IP☆13Nov 6, 2022Updated 3 years ago
- ☆11Nov 14, 2024Updated last year
- Exploits targeting vBulletin.☆74Apr 15, 2023Updated 2 years ago
- A proof of concept for CVE-2023–1326 in apport-cli 2.26.0☆21Dec 6, 2023Updated 2 years ago
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- Automated HTTP Request Repeating With Burp Suite☆39Apr 3, 2023Updated 2 years ago
- Flopz - Firmware Liberation on Python☆14Jun 22, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- ☆11May 24, 2022Updated 3 years ago
- A custom SentinelOne USB scanner.☆19Mar 26, 2022Updated 4 years ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆79Mar 8, 2024Updated 2 years ago
- ☆13Jan 3, 2021Updated 5 years ago
- ☆26Jul 28, 2016Updated 9 years ago
- ☆36Apr 24, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Enumeration & fingerprint tool☆23Mar 3, 2024Updated 2 years ago
- Custom Binary Ninja Themes☆12Nov 11, 2023Updated 2 years ago
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆87Apr 4, 2024Updated last year
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 3 years ago
- ☆19Mar 4, 2023Updated 3 years ago
- GAUSS EU project: Unmanned aerial vehicle Traffic Management (UTM) software development☆14Feb 7, 2022Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆14Jun 23, 2022Updated 3 years ago
- All proxy list, 100000 proxies in proxy.txt☆24Apr 16, 2022Updated 3 years ago
- The Chrome plugin for SafeKeeper password protection service.☆12Apr 25, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- Container building stuff☆16Mar 3, 2026Updated 3 weeks ago
- ☆14Dec 27, 2020Updated 5 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆129Nov 15, 2025Updated 4 months ago
- This library enables you to use Hardware-based PWM channels on Arduino AVR ATtiny-based boards (ATtiny3217, etc.), using megaTinyCore, to…☆11Jan 28, 2023Updated 3 years ago
- WASP Research Arena for Software☆12Jun 10, 2022Updated 3 years ago
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago